Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/11/2011
02:35 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Survey Finds 77% Of IT Staff Say Their Outsourcers Invent Work For Profit

Lieberman survey shows that the relationship between many outsourcing companies and their clients is at a breaking point

May 11, 2011 - A new survey from Lieberman Software Corporation, taken at the recent Infosecurity Europe 2011 event in London and mirrored at RSA Conference 2011 in San Francisco, shows that the relationship between many outsourcing companies and their clients is at a breaking point. According to the survey, an astonishing 77% of IT professionals who work in organisations that use outsourcing say their outsourcers have “...made up...” work in order to earn extra money.

The survey reveals that 43% of IT professionals work in organizations that have outsourced a significant portion of their IT. Larger organizations are more likely to have outsourced IT - with 55% of respondents at organizations having more than 1,000 employees replying that they utilize outsourcers, versus 30% at organizations with less than 1,000 employees.

However, the shock comes as 62% of respondents said that, compared to their original plans, their outsourcing agreements had cost them more than anticipated while only 11% said they paid less than they originally expected. Perhaps most surprisingly, fully 27% of participants said that their outsourcing agreements had cost “…significantly more than planned”.

The Impact of Outsourcing on Security and IT According to Philip Lieberman, President and CEO of Lieberman Software, this should be no surprise to those who have put their faith in the hands of the outsourcing industry: “Fundamentally, IT outsourcing has been an exercise in reducing expenses and passing along HR issues to others. The unfortunate by-product of this quest for lower costs and fewer headaches is a situation where corporate collective knowledge, as well as loyalty and intellectual talent, has been lost.”

“Once upon a time, IT was seen as the lever arm of the company – a group that could use technology to make the organization more competitive, exciting and different in the marketplace. Industry analysts and consultants in the area of business process management came up with the idea that every job could be fully described and therefore outsourced to the lowest bidder.”

“Given that the advice came from a ‘credible source’ these executives were able to achieve remarkable reductions in cost and liability for a while, until business challenges began to appear that required flexibility, corporate knowledge, and dedication to the company. The experts never considered dedication and loyalty as elements in their ‘process reengineering’ - it was deemed as not quantifiable.”

“In the area of security, we are always faced with new threats and the need to evaluate and deploy new technologies and processes to keep one step ahead of criminals and hackers. In this role we are rarely able to predict or totally codify our needs or actions in advance.

What I see today, and what this survey confirms, is that many organizations are growing frustrated with IT departments that consist largely of outsourced employees who come and go at the whim of outsiders. If organizations are going to outsource IT they must measure their outsourcers’ performance across the appropriate set of criteria – not only cost, but resiliency, transparency and data security,” Lieberman said.

The survey took place at Infosecurity Europe 2011 and RSA Conference 2011. Nearly 500 IT professionals participated, all of whom were partly or wholly responsible for an outsourcing function in their organizations and many of whom came from Fortune 100 companies. The full results can be found at www.liebsoft.com/2011_outsourcing_survey.

About Lieberman Software Corporation Lieberman Software provides privileged identity management and security management solutions that protect the multi-platform enterprise. By automating time-intensive IT administration tasks, Lieberman Software increases control over the computing infrastructure, reduces security vulnerabilities, improves productivity and helps ensure regulatory compliance. As Pioneers of Privileged Identity ManagementSM Lieberman Software not only developed the first software solution to address this need, its products continue to lead the market in features and functionality. The company is headquartered in Los Angeles, CA with an office in Austin, TX and channel partners throughout the world. For more information, see www.liebsoft.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.